Matt Blaze

Results: 62



#Item
41GPS / Wireless networking / Surveying / Mobile technology / Mobile phone tracking / Global Positioning System / GPS navigation device / Cell site / GPS tracking unit / Technology / Wireless / Mobile telecommunications

House Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security Hearing on ECPA, Part 2: Geolocation Privacy and Surveillance Written Testimony of Professor Matt Blaze April 25, 2012

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2013-11-17 16:21:51
42Block ciphers / Skipjack / Clipper chip / Cryptographic software / Capstone / Key escrow / Cipher / Public-key cryptography / Key / Cryptography / Key management / National Security Agency

Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2011-11-03 20:44:47
43ICE / Block cipher / Data Encryption Standard / MacGuffin / S-box / Ping / Computing / Software / System software / Computer arithmetic / Q

The MacGun Block Cipher Algorithm Matt Blaze AT&T Bell Laboratories 101 Crawfords Corner Road, Holmdel, NJUSA

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
44Internet / Steven M. Bellovin / Evil bit / Firewall / IPv6 / Matt Blaze / Usenet / Institute of Electrical and Electronics Engineers / Susan Landau / Computing / Computer network security / Cypherpunks

Steven M. Bellovin Percy K. and Vida L.W. Professor of Computer Science smb at cs.columbia.edu http://www.cs.columbia.edu/˜ smb Education

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2015-04-15 13:47:03
45National security / Videotelephony / Privacy of telecommunications / Privacy law / Communications Assistance for Law Enforcement Act / Mass surveillance / Telephone tapping / Voice over IP / SMS / Electronic engineering / Technology / Surveillance

Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze Dept. of Computer and Information Science, University of Pennsylvania Philadelphia,

Add to Reading List

Source URL: www.privacywonk.net

Language: English - Date: 2013-08-27 11:36:52
46Voice over IP / Broadband / Videotelephony / Privacy of telecommunications / Surveillance / VoIP phone / VoIP User / Communications Assistance for Law Enforcement Act / Telephone tapping / Telephony / Electronic engineering / Electronics

Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP Steven Bellovin, Columbia University Matt Blaze, University of Pennsylvania Ernest Brickell, Intel Corporation

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2009-07-26 21:29:02
47Surveillance / Broadcast engineering / Dual-tone multi-frequency signaling / Telephone tapping / Telephone exchange / Signaling / Blue box / Rotary dial / In-band signaling / Telephony / Telecommunications / Privacy of telecommunications

Signaling vulnerabilities in wiretapping systems∗ Micah Sherr†, Eric Cronin, Sandy Clark‡, and Matt Blaze University of Pennsylvania Contact: Matt Blaze, [removed] 8 November 2005

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2006-03-03 16:49:33
48Concurrency / Semaphore / Scheduling / Critical section / Spinlock / Linearizability / Lock / Test-and-set / Thread / Concurrency control / Computing / Computer programming

University of Pennsylvania CSE380 – Operating Systems 1st Midterm Exam – [removed]c 2004 Matt Blaze

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2004-10-17 09:35:55
49Disk encryption / Special purpose file systems / Encrypting File System / Clipper chip / Filesystem-level encryption / Key / Encryption software / Public-key cryptography / Escrow / Cryptography / Cryptographic software / Key management

Key Management in an Encrypting File System Matt Blaze AT&T Bell Laboratories Abstract As distributed computing systems grow in size,

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 1999-11-26 23:55:04
50Computer network security / Data / Internet protocols / Tunneling protocols / Internet standards / IPsec / Internet Key Exchange / Internet Security Association and Key Management Protocol / RADIUS / Computing / Cryptographic protocols / Network architecture

Trust Management for IPsec Matt Blaze AT&T Labs - Research [removed] John Ioannidis AT&T Labs - Research

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2001-03-05 21:44:56
UPDATE